IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Multimedia (View All Report Types)
1 - 25 of 217 Matches Previous Page  |  Next Page
How to Build a Security Strategy
sponsored by Proofpoint, Inc.
VIDEO: The healthcare industry still lags other industries in deploying commonly accepted security technology. In this webinar, learn about the current state of healthcare security and how to build and implement a holistic security architecture.
Posted: 25 Apr 2018 | Premiered: 19 Apr 2018

Proofpoint, Inc.

Integrating, Coordinating, and Orchestrating Enterprise Security Tools
sponsored by Proofpoint, Inc.
VIDEO: Organizations have made significant investments in security technology in the last few years, but these tools are often underutilized due to staff capacity or skills. This webinar explores the security orchestration challenge organizations are facing today.
Posted: 24 Apr 2018 | Premiered: 19 Apr 2018

Proofpoint, Inc.

The General Data Protection Regulation (GDPR) is Here
sponsored by BackOffice Associates
WEBCAST: In this webcast, Enza Iannopollo, security & risk analyst at Forrester Research, demonstrates how to get started on building a risk management policy that will best suit the needs of your company.
Posted: 16 Mar 2018 | Premiered: Mar 16, 2018

BackOffice Associates

Aqua 2.0 Secrets Management for Containers
sponsored by Aqua Security
WEBCAST: Digitization and containerized environments have made secret management much more complicated than it ever was before. Watch this clip on a secret management solution that will seamlessly integrate into your containers from the Hashicorp vault.
Posted: 08 Mar 2018 | Premiered: Jul 27, 2017

Aqua Security

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST: In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018

Illusive Networks

Security and the de-Commoditization of Data
sponsored by Juniper Networks
WEBCAST: According to recent reports, 81% of breaches involve stolen or weak passwords. In this webcast, learn how to prevent a security attack and protect your organization from a data breach.
Posted: 20 Feb 2018 | Premiered: Sep 30, 2017

Juniper Networks

Cyber Threats: Is Your Team Up to the Challenge?
sponsored by Juniper Networks
WEBCAST: In this webcast, gain valuable insight into how to adapt your IT security teams to overcome the evolving cybersecurity landscape.
Posted: 19 Feb 2018 | Premiered: Aug 31, 2017

Juniper Networks

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by WhiteHat Security
VIDEO: Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Secure Coding Practices: Avoid OS Command Injection Attacks
sponsored by WhiteHat Security
VIDEO: Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks.
Posted: 19 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Webinar: What Machine Learning Can (and Can't) do to Help Solve Today's Mobile Security Problems
sponsored by Lookout
WEBCAST: Watch this webinar to discover what machine learning can and can't do to help solve today's top mobile security concerns.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

Lookout

Unified MTD + MARS is the Best Practice for Mobile Security
sponsored by Lookout
WEBCAST: Download this webcast to understand the full mobile risk matrix and discover how mobile threat defense (MTD) combined with mobile app reputation services (MARS) can protect your organization from mobile threats to apps, devices, networks and more.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

Lookout

Security Automation and Orchestration Best Practices
sponsored by ServiceNow
WEBCAST: According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.
Posted: 13 Nov 2017 | Premiered: Nov 13, 2017

ServiceNow

15 Essential DNS and DNSSEC Monitoring Tests
sponsored by Men and Mice
WEBCAST: Don't fall short on your Internet security strategy. In this webcast, you can learn how to use 15 essential DNS and DNSSEC monitoring tests to help your organization detect concerns before your network performance is impacted.
Posted: 03 Nov 2017 | Premiered: Nov 10, 2016

Men and Mice

The SIEM Essentials to Creating Your Own Security Posture
sponsored by Splunk
WEBCAST: Watch this webcast to learn how one of the United States' biggest nuclear research firms puts SIEM software to work as part of their security posture. Go inside to learn how, by implementing SIEM, you too can get customizable incident reporting, real time account activity dashboards, and more.
Posted: 16 Oct 2017 | Premiered: Sep 28, 2017

Splunk

How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017

Splunk

Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017

Splunk

Analytical Stories: How I Learned to Stop Worrying and Respond to Threats
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk

Protecting Data After the Digital Disruption
sponsored by Proofpoint, Inc.
WEBCAST: Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

How to Use Endpoint Analytics to Mitigate Ransomware Damage
sponsored by Splunk
WEBCAST: Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.
Posted: 07 Sep 2017 | Premiered: Sep 14, 2017

Splunk

Stop Attacks in Real-Time with Threat Intelligence
sponsored by Cisco Umbrella
VIDEO: Take a closer look into how threat intelligence can take massive amounts of information and make sense of it all. See how you can use this strategy to respond to threats in real-time before they become attacks.
Posted: 14 Aug 2017 | Premiered: 07 Mar 2017

Cisco Umbrella

Cybersecurity Myths Debunked
sponsored by HelpSystems
WEBCAST: What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.
Posted: 04 Aug 2017 | Premiered: Aug 4, 2017

HelpSystems

Strengthen Your Ransomware Strategy
sponsored by AdvizeX Technologies
WEBCAST: Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.
Posted: 31 Jul 2017 | Premiered: Jul 17, 2017

AdvizeX Technologies

SiliconANGLE Spotlight: HyTrust
sponsored by HyTrust
VIDEO: Join Eric Chiu, the founder and president of HyTrust, a security, compliance and control IT infrastructure company, to learn how this enterprise was founded, what it specializes in, and why you should care.
Posted: 27 Jul 2017 | Premiered: 27 Jul 2017

HyTrust

Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk
sponsored by Lookout
WEBCAST: Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.
Posted: 26 Jun 2017 | Premiered: Jun 6, 2017

Lookout

How the Internet of Things Is Transforming Industries and the Nature of Work
sponsored by Hewlett Packard Enterprise
WEBCAST: Jeff Kaplan, managing director and founder of THINKstrategies, provides his expert insight into what the IoT is all about, including the benefits and challenges you can expect. Learn how to create a digital workplace via IoT, how the IoT increases your security risks, and much more.
Posted: 13 Jul 2017 | Premiered: Jul 13, 2017

Hewlett Packard Enterprise
1 - 25 of 217 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement